Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012.

Slides:



Advertisements
Similar presentations
Information Management and Technology
Advertisements

Data Encryption Data In Transit / Data At Rest. Learning Outcomes How to: – encrypt data on an USB key – encrypt a document – a document safely.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2006 Microsoft Corporation.
Network Systems Sales LLC
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Rodney Buike IT Pro Advisor, Microsoft Canada
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 25 & 27 November 2013.
Thoughts on Technology Issues for Small Business Data Security for Mobile Access Devices.
Data Storage and Security Best Practices for storing and securing your data The goal of data storage is to ensure that your research data are in a safe.
1 Electronic Information Security – What Researchers Need to Know University of California Office of the President Office of Research May 2005.
AmadeusCybersecurity: the essentials12 th November 2014 Alex van Someren Family Office Forum 12 th November 2014, Zurich Cybersecurity: the essentials.
Information Security Awareness April 13, Motivation Recent federal and state regulations and guidance Recent federal and state regulations and guidance.
Social media threats. Warning! May contain mild peril.
Copyright © 2014 Merck Sharp & Dohme Corp., a subsidiary of Merck & Co., Inc. All rights reserved. In practice, how do we recognize a potential Privacy.
9/20/07 STLSecurity is Everyone's Responsibility 1 FHDA Technology Security Awareness.
Basic Data Safety Practices That Can Prevent Malpractice Claims & Ethics Violations Grant County Bar Association June 14, 2011 Kim J. Brand PresidentFounder.
Personal Data Protection and Security Measures Justin Law IT Services - Information Security Team 18, 20 & 25 March 2015.
DATA SECURITY Social Security Numbers, Credit Card Numbers, Bank Account Numbers, Personal Health Information, Student and/or Staff Personal Information,
Introducing TakeCharge SyncedTool The most secure, agile hosted file-sharing platform for business.
10 Essential Security Measures PA Turnpike Commission.
STORING YOUR DATA ……………………………………………………………………………………………………………………………….…………………………….. ……………………………………………………………......…... RESEARCH DATA MANAGEMENT TEAM UK DATA.
>> Press Enter to go to the Next Slide Backup Express Speed Backup Express Speed "Backup Express" will backup all your important files.
New Data Regulation Law 201 CMR TJX Video.
1 Developed by: U-MIC To start the presentation, click on this button in the lower right corner of your screen. The presentation will begin after the.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
Information Security Decision- Making Tool What kind of data do I have and how do I protect it appropriately? Continue Information Security decision making.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
DATA SECURITY AND YOU! W/ DAVE California Center for Population Research.
1.1 System Performance Security Module 1 Version 5.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Information Systems Services How to Protect Yourself On-Line – Keeping Safe At Home Neil Jowsey, IT Security Team 25 th September 2013.
Cyber Security. Security – It’s About Layers There’s no one stop solution to protection Each layer you add, an additional tool will be needed to pierce.
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
ISO27001 Introduction to Information Security. Who has day-to-day responsibility? All of us! Why Information Security? Control risk, limit liability What.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
Oregon Consumer Identity Theft Protection Act Communications Forum Theresa Masse, Chief Information Security Officer Department of Administrative Services.
Information Commissioner’s Office Sheila Logan Operations and Policy Manager Information Commissioner’s Office Business Matters 20 May 2008.
SPH Information Security Update September 10, 2010.
Forensic Procedures 1. Assess the situation and understand what type of incident or crime is to be investigated. 2. Obtain senior management approval to.
Information Systems Services How to Protect Yourself On-Line (Keeping Safe At Work) Kevin Darley, IT Security Co-ordinator 7 th March 2013.
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
Joel Rosenblatt Director, Computer and Network Security September 10, 2013.
Cyber Security Awareness Month Protecting Your Laptop’s Data Off-Campus Safe Computing Part 1.
AIMS To raise awareness of some of the issues To offer advice on solutions To identify what might be considered as ‘best practice’ To launch new Policies.
Staying ahead of the storm: know your role in information security before a crisis hits Jason Testart, IST Karen Jack, Secretariat.
Lessons Learned from Recent HIPAA Breaches HHS Office for Civil Rights.
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Enw / Name. What is a on-line / paper based data capture form Can you give an example where each are used? Automated data capture systems are used around.
Personal Data Protection and Security Measures Kelvin Lai IT Services - Information Security Team 12 & 13 April 2016.
Computer Security Sample security policy Dr Alexei Vernitski.
Common sense solutions to data privacy observed by each employee is the crucial first step toward data security Data Privacy/Data Security Contact IRT.
Secure Services Shared Hosted MS Exchange 2010.
Staying Secure in an Insecure World NATE HOWE CHIEF INFORMATION SECURITY OFFICER Education – Partnership – Solutions.
ICT Laptops Passwords Encryption Back-ups Data Protection and the Internet Viruses Social Networking / Professional Conduct.
Barracuda Networks. Safe Public Cloud Transitions Why Barracuda? The Challenge When organizations move workloads to the public cloud, data protection.
Servelite - Complete IT Solutions. Servelite IT solutions specialize in providing Home solutions and Business solutions. We focus upon delivering quality.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
WHAT ARE BACKUPS? Backups are the last line of defense against hardware failure, floods or fires the damage caused by a security breach or just accidental.
Protecting Data at Rest Through Encryption CIO Summit November 30, 2007.
Information Security Awareness Training
Before the talk… Zix Mail is the approved encrypted platform, we will have training on this soon. Citrix Sharefile has been approved for use for.
12 STEPS TO A GDPR AWARE NETWORK
IT & Security Training Skills.
Implementing Client Security on Windows 2000 and Windows XP Level 150
How to Secure Your Laptops in 5 Easy Steps. Laptops Laptops have been the dynamic devices which brings about the finest portability and at the same time.
Comodo Dome Data Protection
Presentation transcript:

Information Systems Services Protecting Data – Keeping Safe Kevin Darley, IT Security Co-ordinator 8 th November 2012

Information Systems Services Key Points - Information Protection Policy (1) Information Classification: Confidential Highly Confidential Responsibility: Assessment Management & Control Secure Backup: University Servers 3 rd Parties – & Storage

Information Systems Services Key Points - Information Protection Policy (2) Information Access: Password Controls Remote & Home Working Physical Controls & Destruction Transfer of Information: Laptops & Memory Sticks s & Post Encryption Security through Obscurity

Information Systems Services Encryption - The Sophos Suite Device Encryption: Laptop Hard Disks Data Exchange: Removable Media FileShare: Shared Keys Secure Cloud: Externally Hosted Storage

Information Systems Services Why Sophos? Enterprise Solution: Password (Key) Self-Service Reset Challenge Response Key Deletion Key Escrow What’s Missing?

Information Systems Services Meanwhile……. ……..you can use the in-built encryption tool of Office to ‘secure’ documents and then them as an attachment, but beware…..

Information Systems Services

Common Pitfalls: Phishing Mis-configuration/Unauthorised Software Misdirection of Loss of Laptop, Memory Stick or Documents Theft of Laptop or Documents Inadvertent Inclusion of Sensitive Information

Information Systems Services Areas of Risk: Home PCs: Open Access Dodgy Websites Onus of Maintenance Laptops & Briefcases: Higher Probability of Burglary Easy to Carry V & A

Information Systems Services Risk Reduction: Maintain Security of Home PCs: Microsoft Security Essentials Malware Bytes Onus for Maintenance Portable Devices: Use In-built Security Report Loss/Theft Laptops & Briefcases: Be Security Conscious Out of Sight / Take it to Bed

Information Systems Services Help & Reporting : If in Doubt Please Ask!: ISS Helpdesk % ) Please Report Actual or Suspected Security Breaches as soon as Possible: Kevin Darley – IT Security Co-ordinator % )